Description: A malicious actor can see the wordpress config details and can also extract DB_NAME , DB_USERNAME and DB_PASSWORD

Severity: High

Shodan/Censys Dork: wordpress

How to Run: echo "target"| httpx --silent | nuclei -t wordpress=config.yaml